Orange County NC Website
Customer Agency Name <br /> Month 1, 2019 <br />The Proposal Title Goes Here and Breaks Like This Use or disclosure of this proposal is subject <br /> to the restrictions on the cover page. <br /> Motorola Solutions Confidential Restricted ASTRO 25 Advanced Services Statement of Work 1-38 <br />Firewall Description <br />Custom The Customer may opt to install their own firewalls and request that <br />Motorola Solutions monitor them. The most common location is at console <br />sites. The Customer will be required to work with Motorola Solutions to <br />determine if and how custom firewalls can be monitored. Monitoring these <br />firewalls will increase the monitoring fees. <br />1.4.7.7 Security Monitoring Priority Level Definitions and Response Times <br />Table 1-11: Priority Level Definitions and Response Windows <br />Incident <br />Priority <br />Recognized Incident Definition Response Time <br />Critical <br />P1 <br />Security incidents that have caused, or are suspected to <br />have caused significant and/or widespread damage to the <br />functionality of the Customer’s ASTRO 25 system or <br />information stored within it. Effort to recover from the <br />incident may be significant. <br />Examples: <br /> Malware that is not quarantined by anti-virus <br /> Evidence that a monitored component has <br />communicated with suspected malicious actors. <br />Response provided 24 <br />hours, 7 days a week, <br />including US Holidays. <br />High P2 Security incidents that have localized impact, but have the <br />potential to become more serious if not quickly addressed. <br />Effort to recover from the incident may be moderate to <br />significant. <br />Examples: <br /> Malware that is quarantined by antivirus. <br /> Multiple behaviors observed in the system that are <br />consistent with known attacker techniques. <br />Response provided 24 <br />hours, 7 days a week, <br />including US Holidays. <br />Medium <br />P3 <br />Security incidents that potentially indicate an attacker is <br />performing reconnaissance or initial attempts at accessing <br />the system. Effort to recover from the incident may be low to <br />moderate. <br />Examples include: <br /> Suspected unauthorized attempts to log into user <br />accounts. <br /> Suspected unauthorized changes to system <br />configurations, such as firewalls or user accounts. <br /> Observed failures of security components. <br /> Informational events. <br /> User account creation or deletion. <br /> Privilege change for existing accounts. <br />Response provided <br />Monday through Friday 8 <br />a.m. to 5 p.m. local time, <br />excluding US Holidays. <br />Low P4 These are typically service requests from the Customer. Response provided <br />Monday through Friday 8 <br />a.m. to 5 p.m. local time, <br />excluding US Holidays. <br /> <br /> <br />DocuSign Envelope ID: 22453AE7-FED2-4AEF-91BB-1C6406B68FE8